DocumentCode
2018755
Title
A fast sketch for aggregate queries over high-speed network traffic
Author
Liu, Yang ; Chen, Wenji ; Guan, Yong
Author_Institution
Dept. of Electr. & Comput. Eng., Iowa State Univ., Ames, IA, USA
fYear
2012
fDate
25-30 March 2012
Firstpage
2741
Lastpage
2745
Abstract
There have been security problems and network failures that are hard to resolve, for example, botnets, polymorphic worm/virus, DDoS, etc. To address them, we need to monitor the traffic dynamics and have a network-wide view about them, and more importantly, be able to detect attacks and failures in a timely manner. Due to the rapid increase in the traffic volume, it is often infeasible to monitor every individual flow in the backbone network due to space and time constraints. Instead, we are often required to aggregate packets into a small number of flows and develop the detection methods with aggregated flows, namely aggregate queries. Although it enables ISPs to detect network problems in a timely manner, the flow aggregation cannot preserve certain critical information in network traffic, e.g., IP addresses, port numbers, etc. Due to such missing information, it becomes very difficult (or often infeasible) for ISPs to identify the sources of network attacks or the causes of traffic anomalies, which are important to resolve the network problems effectively. In this paper, we propose an efficient data structure, namely the fast sketch, which can both aggregate packets into a small number of flows, and further enable ISPs to identify the anomalous keys (IP addresses, port numbers, etc.), with small space and time. With it, the number of aggregated flows can achieve the lower bound of the heavy-change detection, i.e., Ω(k log(n/k)), where n is the range of flow keys and k is an upper bound of the number of anomalous keys. In addition, our sketch combines both the combinatorial group testing and the quotient technique to identify anomalous keys, which can guarantee a sub-linear running time. We expect our work will improve the practice for real-time traffic monitoring in a high-speed networked system.
Keywords
IP networks; Internet; combinatorial mathematics; computer viruses; data structures; group theory; query processing; telecommunication security; telecommunication traffic; IP addresses; ISP; Internet service providers; anomalous keys identification; attack detection; backbone network; botnets; combinatorial group testing; data structure; failure detection; fast sketch; high-speed network traffic; high-speed networked system; network failures; packet aggregation; polymorphic virus; polymorphic worm; port numbers; query aggregation; quotient technique; real-time traffic monitoring; security problems; space constraints; sublinear running time; time constraints; traffic anomalies; traffic dynamic monitoring; Aggregates; IP networks; Internet; Monitoring; Protocols; Radiation detectors; Testing;
fLanguage
English
Publisher
ieee
Conference_Titel
INFOCOM, 2012 Proceedings IEEE
Conference_Location
Orlando, FL
ISSN
0743-166X
Print_ISBN
978-1-4673-0773-4
Type
conf
DOI
10.1109/INFCOM.2012.6195691
Filename
6195691
Link To Document